Please turn on your JavaScript for this page to function normally.
72% of companies are not prepared for a data breach

EiQ Networks conducted a survey on information security priorities and challenges. Based on responses from 168 IT decision makers across industries, results point to lack of …

Rapid7 acquires NT OBJECTives, offers web app scanning

Rapid7 has acquired NT OBJECTives (NTO), expanding Rapid7’s Threat Exposure Management offering to further meet the needs of business infrastructures.NTO’s application …

Banking Trojan delivered to companies via macro-based malware

“Cybercriminals continue targeting enterprises with malicious emails whose ultimate goal is to infect company computers with the Dyre/Dyreza banking malware. But instead …

Library
Application manager that pleases both IT and the user

At RSA Conference 2015 AppSense announced the release of AppSense Application Manager version 8.9.Application Manager 8.9 leverages AppSense’s decade-plus experience balancing …

WinMagic
SecureDoc Cloud removes security concerns related to cloud file sharing

WinMagic introduced at RSA Conference 2015 security software that encrypts and manages how files are shared via cloud file sharing services such as Dropbox or Box. SecureDoc …

corporate
Network discovery and visibility for massive enterprise networks

At RSA Conference 2015, Auconet unveiled its new Enterprise Security Foundation (ESF) that fortifies security for both partners and enterprises. ESF provides third-party …

The ticking cybersecurity risk: Managing wearable tech in the workplace

Smartphones and tablets took time to effectively crossover from consumer device to business staple. Wearables, despite still being the infants of IT hardware, are already …

Gemalto
Gemalto’s solutions challenge today’s security thinking

Gemalto demonstrates at RSA Conference 2015 how its SafeNet Identity and Data Protection solutions help enterprises challenge today’s security thinking with a new data …

Cloud
Protecting identities from the endpoint to the cloud

At RSA Conference 2015, RSA launched the RSA Via family of Smart Identity solutions, engineered to combine authentication, identity and access management, and identity …

user
2 out of 3 IT pros put systems at risk by making undocumented changes

The Netwrix 2015 State of IT Changes Survey of more than 700 IT professionals across 40 industries found that 70% of companies forget about documenting changes, up from 57% …

Head
How attackers exploit end-users’ psychology

At RSA Conference 2015, Proofpoint released the results of its annual study that details the ways attackers exploit end-users’ psychology to circumvent IT security.Last …

escalator
Simplified VPN, web access for authorized users via push notification

Entrust Datacard announced at RSA Conference 2015 the introduction of a new push authentication capability in its Entrust IdentityGuard Mobile platform that allows authorized …

Don't miss

Cybersecurity news